Skip to content
Mason Davis edited this page Jan 22, 2023 · 13 revisions

logo

Welcome to the Gato Wiki!

For information on how to install gato, please see the project's README!

What does Gato do?

Gato, or GitHub Attack TOolkit, is intended for security professionals to evaluate the security of GitHub organizations, focusing on self-hosted runners.

What Gato isn't

Gato is not intended to be an all-encompassing enumeration tool for GitHub. Secrets stored and utilized for GitHub actions can also be accessed using a compromised PAT that can update workflow code. The topic of secret disclosure from GitHub Actions has been examined by many security researchers, and there are excellent resources that can be found online detailing how a threat actor could gain access to secrets.

Why release this tool?

During our red team assessments, CI/CD has been the weak link for many organizations. GitHub, in particular, is becoming one of the key players in enterprise SCM solutions as organizations move away from on premises code repositories. We wanted to release a tool that allows organizations to assess the impact of developer credential compromise and provide a valuable tool for red-teamers and penetration testers to evaluate the access gained from GitHub PATs compromised during an engagement.

There is also a very interesting attack surface in the form of public repositories that utilize self-hosted runners. This tool provides some features to speed up the exploration of that attack path.

I want to contribute!

That is excellent! We welcome new contributions from the security community. Please take a look at our contribution guide and review our project design and coding standards.

Maintainers

The following engineers developed this project:

  • Adnan Khan [Twitter]
  • Mason Davis
  • Matt Jackoski

Logo

We thank Kaitlin York for making such an awesome mascot logo.

Clone this wiki locally